It’s really amazing what gets uncovered during semi-annual data security assessments.

Vulnerabilities, discovered. Holes in processes revealed. Duplicate data, exposed. 
You name it. We’ve seen it.

That’s because a lot happens in 6 months and businesses simply can’t keep up.

  • Dev environments are updated
  • Employee roles and responsibilities shift
  • Business objectives evolve
  • …and your security and infrastructure change each time a business modification in made

Rather than go on and on about the importance of conducting data security assessments every six months, we’re going to let you in on a few of the crazy (and truly risky) cyber-security infractions we have uncovered.

Join us in October for a truly scary reality - that you’re probably breaching your company’s security as we speak, and incurring thousands in unnecessary costs.

Featured Webinar Hosts:

Greg Shanton Bio Pic

 

Greg Shanton
Vice President  of Cybersecurity

Greg is the Vice President of Cyber Security for Neovera, leading the cyber security professional services, security monitoring, and management services for Neovera providing services to both commercial and government clients. Before joining Neovera, Greg served in various capacities at CA Technologies, as Senior Vice President of CA’s professional services North American and Global Practices units, Vice President of the Identity and Access Management practice and the global lead for CA’s Cloud Security (Secure Cloud) partner program. Clients included both public and private sectors.

Nestor_Headshot_2023

 

Nestor Morejon
Senior Enterprise Security Architect

Nestor has over 30 years of IT experience, from product development to full-scale, worldwide, complex enterprise deployments. Specializing in cyber security for most of his career, he has worked as a CISO, a consultant, and an SVP, Distinguished Engineer at CA Technologies. Nestor is a thought leader in the industry, conference speaker, and trusted advisor to many C-level executives of some of the largest organizations and government entities in the world. He has developed architecture requirements & deployment methodologies, compliance assessment & remediations, and has been key in major enterprise transformation projects.

Access the Webinar

Fill out the form below to access the recording.